A quick script to spot the usage of Unicode Bidi (bidirectional) characters that could lead to an Invisible Backdoor
☆34Nov 17, 2022Updated 3 years ago
Alternatives and similar repositories for invisible-backdoor-detector
Users that are interested in invisible-backdoor-detector are comparing it to the libraries listed below
Sorting:
- Take domains on stdin and output them on stdout if they get resolved☆32May 27, 2022Updated 3 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Perform arp spoofing attack in C☆14Aug 18, 2023Updated 2 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 3 months ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 3 months ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆60Dec 15, 2023Updated 2 years ago
- Exfiltration based on custom X509 certificates☆26Feb 23, 2024Updated 2 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 4 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆31Sep 2, 2023Updated 2 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆23Nov 6, 2023Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 2 months ago
- A binary hardening system☆111Sep 30, 2023Updated 2 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Scripts to secure and harden Mac OS X☆30Nov 16, 2021Updated 4 years ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 3 years ago
- Powershell Network Scanner☆38Jan 20, 2020Updated 6 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆78Jan 1, 2025Updated last year
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- Code from my old page ge.mine.nu☆36Feb 2, 2024Updated 2 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- AntiRansomware Linux Kernel Module☆37May 25, 2023Updated 2 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆41Oct 19, 2023Updated 2 years ago
- ☆38Jun 5, 2023Updated 2 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Windows Etw LPE☆51Oct 12, 2021Updated 4 years ago
- dev backup for main site☆40Jan 3, 2018Updated 8 years ago
- Draft and review content for MoJ IT Policy.☆11Sep 2, 2020Updated 5 years ago
- ☆36Jun 23, 2022Updated 3 years ago